Cybersecurity attempted breach is performed successfully. Due to the

Cybersecurity Due to the increasing dependence of digitaltechnologies to conduct operations, cybersecurity became important due to cyberrisk or incidents. Cyber risk a company may face includes remediation cost forstolen assets or information as well as the repair cost of system damage thatmay have been caused, an increase it budget on cybersecurity, lost revenue fromunauthorized use of proprietary information, litigation and most importantlyreputation damage that deters customers or investors. Since 2011, the Security and ExchangeCommission (SEC) has established the CF Disclosure Guidance: Topic no.

2 to makecompanies disclose their obligations relating to cybersecurity risk and cyberincidents, the third line of defense from cyber attacks have fallen to thehands of internal audits. As an internal audit, several responsibility that isgiven includes working with management and board of directors to develop cybersecurity strategy, improving the company’s resistance to potential risk bothfrom internal and external attacks, keeping a current understanding ofpotential cyber risk and make sure everyone is highly engaged due to theeverchanging nature of cyber risk, make sure the number of personnel working oncybersecurity is sufficient and evaluate the cyber security program with theNIST Cybersecurity framework, ISO 27001 and 27002 and disclosing event of cyberincidents at a timely manner. However, due to the aforementionedeverchanging nature of technology and cyber risk, it is hard to stay in thearms race. In June of 2017, a global ransomware attack happened and due tobeing a new type of malware, due to its difference with other malwares, even ifKapersky announced the finding of its prototype in 2016, it remained undetectedwhen the malware enters the system.  Conclusion I think the responsibility on cybersecurityput on internal audit is quite a difficult task to handle due to theeverchanging and growing ways of compromising a cybersecurity system. Attackscould come at anytime from anywhere, and the hole in the security system cannotbe easily noticed unless an attempted breach is performed successfully. Due tothe nature of cybersecurity, I suggest that additional tool to be used to aidauditors in their endeavour. Recommendations I think using AI through the process ofmachine learning, it can help identify the security risk.

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
4,80
Writers Experience
4,80
Delivery
4,90
Support
4,70
Price
Recommended Service
From $13.90 per page
4,6 / 5
4,70
Writers Experience
4,70
Delivery
4,60
Support
4,60
Price
From $20.00 per page
4,5 / 5
4,80
Writers Experience
4,50
Delivery
4,40
Support
4,10
Price
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

In an interview withForbes, Simon Crosby CTO of Bromium said the AI is not going to be perfect,since they function with pattern recognition and not necessarily able todifferentiate different kind of approaches, but it can help to reduce theburden placed on internal auditors on cybersecurity, since they learn fromprevious attacks and identify the holes in the cybersecurity. The fact that anAI can function 24 hours a day makes it so even when the absence ofcybersecurity personnel, an amount of protection is still given to the data andinformation.       Reference Opgenorth, K. (n.

d.). KnowledgeLeader Blog.Retrieved January 15, 2018, from http://info.knowledgeleader.com/what-is-internal-audits-role-in-cyber-securityCF Disclosure Guidance: Topic No. 2. (2011,October 13).

Retrieved January 15, 2018, from https://www.sec.gov/divisions/corpfin/guidance/cfguidance-topic2.htmEY – 2017 year-end issues for auditcommittees. (n.d.

). Retrieved January 15, 2018, from http://www.ey.com/us/en/issues/governance-and-reporting/audit-committee/ey-2017-year-end-issues-for-audit-committees-to-consider#SEC-developmentsEditors, F. T.

(2017, August 21).Separating Fact From Fiction: The Role Of Artificial Intelligence InCybersecurity. Retrieved January 15, 2018, from https://www.forbes.com/sites/forbestechcouncil/2017/08/21/separating-fact-from-fiction-the-role-of-artificial-intelligence-in-cybersecurity/#6a8c32fe1883Frenkel, S. (2017, June 27). GlobalRansomware Attack: What We Know and Don’t Know.

Retrieved January 15, 2018,from https://www.nytimes.com/2017/06/27/technology/global-ransomware-hack-what-we-know-and-dont-know.html